Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: boots





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,602,466 Method and apparatus for securing a computer
A computer system (100) is arranged to run at east one user-oriented operating system (153) (e.g. Windows, LINUX, etc.) on which a plurality of user-oriented...
US-9,602,344 Automated establishment of access to remote services
A software application designed to operate within an enterprise system is modified to operate properly within a system of a third-party provider. In one...
US-9,601,218 Memory device and computing system including the same
A memory system includes a read-only memory (ROM), a main memory and a processor. The ROM stores a basic input/output system (BIOS). The main memory includes a...
US-9,601,175 Word line auto-booting in a spin-torque magnetic memory having local source lines
In a spin-torque magnetic random access memory (MRAM) that includes local source lines, auto-booting of the word line is used to conserve power consumption by...
US-9,600,671 Systems and methods for account recovery using a platform attestation credential
Described herein is technology for restoring access to a user account. In particular, systems and methods for account recovery using a platform attestation...
US-9,600,295 Systems and methods of providing multiple video outputs during a pre-boot environment
Systems and methods for providing pre-boot displays at the same time on both a discrete video controller and an embedded video controller of an information...
US-9,600,294 Port throttling across an operating system restart during a hot upgrade
A method includes tagging, by a processor executing a first operating system kernel, a region of a memory used by a first storage area network (SAN) adapter...
US-9,600,293 Logic block addressing (LBA) configuration method and non-volatile memory device having the same
A logic block addressing (LBA) configuration method and a non-volatile memory device having the same are provided. The non-volatile memory device determines one...
US-9,600,292 Common boot sequence for control utility able to be initialized in multiple architectures
A common boot sequence facility is provided that enables a control utility (e.g., operating system, control program, or other standalone tool, as examples) to...
US-9,600,291 Secure boot using a field programmable gate array (FPGA)
This disclosure describes techniques for ensuring security in an integrated circuit system that includes a processor subsystem and a configurable-logic (e.g.,...
US-9,598,176 Health monitoring pneumatic deicer
A monitored deicing system is disclosed. The monitored deicing system may have a pneumatic deicer and a signal wire running through the pneumatic deicer. The...
US-9,597,968 Shroud for electric vehicle charger receptacle
A boot-like shroud or cover that forms a compressive seal around the charging receptacle of an electric vehicle is provided to shield a charging port housing...
US-9,596,903 Shoe to boot conversion system
A footwear conversion system is described herein that allows a user's shoe to be worn as a regular high heeled shoe or as an ankle boot and to be able to...
US-D781,574 Backpack with hat and boot compartments
US-9,596,085 Secure battery authentication
An embodiment includes a method executed by at least one processor comprising: an out-of-band cryptoprocessor receiving security credentials from a battery,...
US-9,596,082 Secure debug trace messages for production authenticated code modules
Methods of extending capabilities of authenticated code modules (ACM) with minimal increase in code size comprises defining an authenticated code module (ACM)...
US-9,594,927 Providing a trusted execution environment using a processor
In an embodiment, a system on a chip includes: a single core to execute a legacy instruction set, the single core configured to enter a system management mode...
US-9,594,910 In-system provisioning of firmware for a hardware platform
A hardware platform includes a nonvolatile storage device that can store system firmware as well as code for the primary operating system for the hardware...
US-9,594,638 Host recovery using a secure store
Approaches are described for enabling a host computing device to store credentials and other security information useful for recovering the state of the host...
US-9,594,611 Information processing apparatus, method for controlling information processing apparatus, non-transitory...
According to the embodiments, a nonvolatile memory device is configured to store a normal operating system, and store a bootloader. A host device is capable of...
US-9,594,571 Mechanism for obviating the need for host-side basic input/output system (BIOS) or boot serial peripheral...
The present disclosure describes several embodiments, e.g., a method, a baseboard management controller (BMC) system, a computer-readable non-transitory medium,...
US-9,594,570 Computing platform with interface based error injection
Described is a computing platform, which comprises: a non-volatile memory having a firmware boot program; and a CPU to execute the firmware boot program when...
US-9,594,569 Apparatus and method for booting
A method and device for a booting that can reduce a booting time is provided. The method includes loading a snapshot image from a non-volatile memory, setting...
US-9,594,568 System and method for thermal control of an information handling system
A computer-implemented method enables Basic Input/Output System (BIOS) progress code based thermal control during start-up of an information handling system. A...
US-9,594,567 Configuring a trusted platform module
A method includes storing configuration data for a Trusted Platform Module (TPM) in a pre-boot environment such as Unified Extensible Firmware Interface (UEFI),...
US-9,594,486 Processor architecture using a RISC processor and multiple adjunct processors
A method for processing data comprising activating a reduced instruction set processor. Activating a basic input output system of the reduced instruction set...
US-9,592,807 Brake chamber, boot member, and bush member
A brake chamber includes a rod member that makes reciprocating motion within a cylinder through a pressure of compressed air or an urging force of a spring,...
US-9,591,887 Hybrid skate boot
A method of making a skate boot upper, including integrally molding a boot portion from a first material, the boot portion including at least an instep portion...
US-D781,043 Boot upper
US-D781,031 Boot
US-D781,030 Boot
US-9,590,806 Secure provisioning of semiconductor chips in untrusted manufacturing factories
One embodiment of the present invention includes a boot read only memory (ROM) with an embedded, private key provision key (KPK) set that enables secure...
US-9,589,159 Creating secure communication channels between processing elements
Two processing elements in a single platform may communicate securely to allow the platform to take advantage of the certain cryptographic functionality in one...
US-9,589,139 Method and device for altering a unified extensible firmware interface (UEFI) secure boot process in a...
Firmware in a computing device is used to administer and alter a Secure Boot process for the computing device while continuing to provide protection from...
US-9,589,138 Computing device boot software authentication
Various embodiments are generally directed to authenticating a chain of components of boot software of a computing device. An apparatus comprises a processor...
US-9,589,128 User trusted device for detecting a virtualized environment
The present invention is notably directed to a method for enabling a computer (101) to boot from a user trusted device (10), the user trusted device (10)...
US-9,588,936 Automatically transmitting a web browser file over the internet when booting an operating system from a data...
A data storage device is disclosed comprising a non-volatile memory having a host operating system stored in an unprotected area of the non-volatile memory, a...
US-9,588,829 Security method and apparatus directed at removable storage devices
A method of protecting a computer against malware infection. The method includes during operation of the computer, reading master boot record code from a...
US-9,588,793 Creating new virtual machines based on post-boot virtual machine snapshots
Systems and methods for creating new virtual machines based on post-boot virtual machine snapshots. An example method may include: receiving a request to create...
US-9,588,774 Common boot sequence for control utility able to be initialized in multiple architectures
A common boot sequence facility is provided that enables a control utility (e.g., operating system, control program, or other standalone tool, as examples) to...
US-9,586,130 Parkour wheeled boot for increasing moving speed
A parkour wheeled boot for increasing moving speed, having self-balancing function, wearable on a respective leg of a user. Each boot has a wearing mechanism, a...
US-9,585,545 Disposable suction valve for an endoscope
A disposable suction valve is provided. In some embodiments, the disposable suction valve may include a stem providing an air passage through the stem, a...
US-D780,402 Boot jack
US-9,584,365 Server and method for setting a mode of the server
A method for setting a mode of a server includes setting the mode of the server to the negative mode when the sever boots, monitoring the network to detect a...
US-9,584,317 Identifying security boundaries on computing devices
During booting of a computing device, multiple security boundaries are generated. A security boundary refers to a manner of operation of a computing device or a...
US-9,583,961 Intellectual power storing system and method for managing battery-array of the intellectual power storing system
An intellectual power storing system comprises an indoor-controlling device and a battery array which are arranged in a building. After booting, the...
US-9,582,393 Method to facilitate rapid deployment and rapid redeployment of an information handling system
An information handling system includes a processor, a Unified Extensible Firmware Interface (UEFI) boot volume, and a memory including UEFI code and a setup...
US-9,582,262 Systems and methods for installing upgraded software on electronic devices
Systems, methods, and computer-readable media for upgrading electronic devices are provided. An exemplary method executed by a hardware processor may comprise...
US-9,582,223 Efficient reclamation of pre-allocated direct memory access (DMA) memory
For efficient reclamation of pre-allocated direct memory access (DMA) memory in a computing environment, hot-add random access memory (RAM) is emulated for a...
US-9,581,292 Magnetic surface mounting apparatus
A magnetic surface mounting apparatus used for hanging items is described. The apparatus has several parts that can assemble and disassemble easily. The magnet...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.